Search dblp for Publications

export results for "toc:db/journals/jdm/jdm14.bht:"

 download as .bib file

@article{DBLP:journals/jdm/AllenM03,
  author       = {Gove N. Allen and
                  Salvatore T. March},
  title        = {Modeling Temporal Dynamics for Business Systems},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {3},
  pages        = {21--36},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003070102},
  doi          = {10.4018/JDM.2003070102},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/AllenM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/BaeKH03,
  author       = {Kyoung{-}Il Bae and
                  Jung{-}Hyun Kim and
                  Soon{-}Young Huh},
  title        = {Federated Process Framework in a Virtual Enterprise Using an Object-oriented
                  Database and Extensible Markup Language},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {1},
  pages        = {27--47},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003010102},
  doi          = {10.4018/JDM.2003010102},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/BaeKH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/BajajR03,
  author       = {Akhilesh Bajaj and
                  Sudha Ram},
  title        = {{IAIS:} {A} Methodology to Enable Inter-Agency Information Sharing
                  In eGovernment},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {4},
  pages        = {59--80},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003100104},
  doi          = {10.4018/JDM.2003100104},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/BajajR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/BaskervilleP03,
  author       = {Richard L. Baskerville and
                  Victor Portougal},
  title        = {A Possibility Theory Framework for Security Evaluation in National
                  Infrastructure Protection},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {2},
  pages        = {1--13},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003040101},
  doi          = {10.4018/JDM.2003040101},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/BaskervilleP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/DahanayakeSS03,
  author       = {A. N. W. Dahanayake and
                  Henk G. Sol and
                  Zoran Stojanovic},
  title        = {Methodology Evaluation Framework for Component-Based System Development},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {1},
  pages        = {1--26},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003010101},
  doi          = {10.4018/JDM.2003010101},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/DahanayakeSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/LloydPLY03,
  author       = {Scott J. Lloyd and
                  Joan Peckham and
                  Jian Li and
                  Qing Yang},
  title        = {{RORIB:} An Economic and Efficient Solution for Real-Time Online Remote
                  Info Backup},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {3},
  pages        = {56--73},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003070104},
  doi          = {10.4018/JDM.2003070104},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/LloydPLY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/NicolleYS03,
  author       = {Christophe Nicolle and
                  Kokou Y{\'{e}}tongnon and
                  Jean{-}Claude Simon},
  title        = {{XML} Integration and Toolkit for {B2B} Applications},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {4},
  pages        = {33--58},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003100103},
  doi          = {10.4018/JDM.2003100103},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/NicolleYS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/PatnaikP03,
  author       = {Satyadeep Patnaik and
                  Brajendra Panda},
  title        = {Transaction-Relationship Oriented Log Division for Data Recovery from
                  Information Attacks},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {2},
  pages        = {27--41},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003040103},
  doi          = {10.4018/JDM.2003040103},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/PatnaikP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/PonsA03,
  author       = {Alexander Perez{-}Pons and
                  Hassan Aljifri},
  title        = {Data Protection Using Watermarking in E-Business},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {4},
  pages        = {1--13},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003100101},
  doi          = {10.4018/JDM.2003100101},
  timestamp    = {Fri, 11 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdm/PonsA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/ReidD03,
  author       = {Randal Reid and
                  Gurpreet Dhillon},
  title        = {Integrating Digital Signatures with Relational Databases: Issues and
                  Organizational Implications},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {2},
  pages        = {42--51},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003040104},
  doi          = {10.4018/JDM.2003040104},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/ReidD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/SelonenKS03,
  author       = {Petri Selonen and
                  Kai Koskimies and
                  Markku Sakkinen},
  title        = {Transformation Between {UML} Diagrams},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {3},
  pages        = {37--55},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003070103},
  doi          = {10.4018/JDM.2003070103},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdm/SelonenKS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/ShankaranarayanZW03,
  author       = {G. Shankaranarayan and
                  Mostapha Ziad and
                  Richard Y. Wang},
  title        = {Managing Data Quality in Dynamic Decision Environments: An Information
                  Product Approach},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {4},
  pages        = {14--32},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003100102},
  doi          = {10.4018/JDM.2003100102},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/ShankaranarayanZW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/SujitparapitayaJG03,
  author       = {Sutee Sujitparapitaya and
                  Brian D. Janz and
                  Mark Lee Gillenson},
  title        = {The Contribution of {IT} Governance Solutions to the Implementation
                  of Data Warehouse Practice},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {2},
  pages        = {52--69},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003040105},
  doi          = {10.4018/JDM.2003040105},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/SujitparapitayaJG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/Weber03,
  author       = {Ron Weber},
  title        = {Conceptual Modeling and Ontology: Possibilities and Pitfalls},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {3},
  pages        = {1--20},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003070101},
  doi          = {10.4018/JDM.2003070101},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/Weber03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/WeipplEKS03,
  author       = {Edgar R. Weippl and
                  Wolfgang E{\ss}mayr and
                  Ludwig Klug},
  title        = {A New Approach To Secure Federated Information Bases Using Agent Technology},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {1},
  pages        = {48--68},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003010103},
  doi          = {10.4018/JDM.2003010103},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/WeipplEKS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/WilsonR03,
  author       = {Rick L. Wilson and
                  Peter A. Rosen},
  title        = {Protecting Data through Perturbation Techniques: The Impact on Knowledge
                  Discovery in Databases},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {2},
  pages        = {14--26},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003040102},
  doi          = {10.4018/JDM.2003040102},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/WilsonR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics